Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies

AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-141A) published on May 21, 2025. The CSA highlights a cyber espionage-oriented campaign carried out by cyber actors affiliated ...
Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...
Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

Spear-Phishing Campaigns Target Russian, Belarusian Groups

As per recent reports, various Russian and Belarusian organizations have been targets of spear-phishing campaigns. These organizations belong to the non-profit, media, and international government sectors. Threat actors who orchestrated these spear-phishing ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

BunnyLoader Malware: Modular Features Help Evade Detection

In the ever-evolving landscape of cybersecurity threats, a new variant of malware has emerged, posing significant challenges for detection and mitigation efforts. Known as BunnyLoader malware, it has recently undergone a transformation, ...

Russian Hackers Target Ukraine Via A Disinformation Campaign

Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?

Credential Harvesting Vs. Credential Stuffing Attacks: What’s the Difference?

Credential stuffing and harvesting, although similar, have nuanced differences particularly in how credentials are stolen, acquired and used ...
Security Boulevard